5 Key Takeaways | AI and Your Patent Management, Strategy & Portfolio
Compliance Tip Of the Day: Using AI to Transform Whistleblower Response
JONES DAY TALKS®: Women in IP – AI and Copyright Law Need-to-Knows
The FinReg Frontier: AI and Machine Learning in Consumer Finance — The Consumer Finance Podcast
Key Discovery Points: AI Says AI Will Replace Paralegals… But Not So Fast!
Compliance and AI: Ali Khan on Implementing AI Risk Management Systems
Key Discovery Points: Get Your Copy of the 2025 eDiscovery State of the Industry Report
Approach to Responsible AI
AI and Compliance
Bridging the Gap: How CivicReach is Revolutionizing Government Customer Service
Episode 358 - Ethics and Compliance Trends for 2025: Is Your Company Prepared?
Consumer Finance Monitor Podcast Episode: The Patterns of Digital Deception
No Password Required Podcast: Senior Security Researcher at Nokia and Guardian of Secure AI Networks
Episode 354 -- The New Era of Compliance: Generative AI, Data and Innovation
The Growing Role of State AGs in AI Regulatory & Enforcement Issues — The Good Bot Podcast
Crafting an Effective Law Firm Generative AI Policy for Responsible Business Use: On Record PR
The Privacy Insider Podcast Episode 9: I Think, Therefore I Am: AI, Ethics, & Humanity With Dr. Michael Hemenway
AI Post-Election – Initial Government Insights
Can You Copyright AI-Generated Content? - On Record PR
How Attorneys’ Views on AI Are Impacting eDiscovery
Cybersecurity in 2025 will continue to face escalating challenges from AI-driven threats, geopolitical tensions, and increased regulatory scrutiny. Organizations must adapt to sophisticated cyberattacks fueled by AI,...more
The “Bad Likert Judge” jailbreaking technique boasts a high attack success rate by using a three-step approach which employs the target LLM’s own understanding of harmful content to bypass the target LLM’s safety guardrails....more
Publications & Advisories - November 2024 – Kathleen Benway, Jennifer Everett, Alysa Austin, and Kristen Bartolotta published “Federal Trade Commission’s Updated Health Breach Notification Rule Is Now in Effect” in Employee...more
Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more
Technological advancements are plentiful in the world of cybersecurity and are often seen as a double-edged sword, a sentiment that holds true in the rise of generative AI. As AI gains traction for its versatility and power,...more
Cyberattacks powered by artificial intelligence have become more sophisticated as bad actors utilize machine learning to analyze vulnerabilities, automate exploits, and outpace traditional security measures. Through the use...more
Welcome to our inaugural issue of The Health Record - our healthcare law insights e-newsletter! As such, we wanted to pull together our insights and pass them along to you. Our goal is to create a publication that is...more
The Department of Health and Human Services recently issued a health sector alert through the Health Sector Cybersecurity Coordination Center (HC3)....more
The race to develop AI and calls to regulate it are heating up around the world. In November 2023, 28 countries, including the United States, United Kingdom, China, and the European Union, met and pledged to work together to...more
In a world of ever increasing attacks, this session will discuss modern techniques for mitigating the biggest cost drivers should your company suffer a breach. We will facilitate a collaborative discussion on the different...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more
Machine learning (ML) models are a cornerstone of modern technology, allowing models to learn from and make predictions based on vast amounts of data. These models have become integral to various industries in an era of rapid...more
Emerging developments in AI, Machine Learning, Natural Language Processing, Automation, and More – Where Does it All Fit Inside the World of GRC? AI-driven technology has been making headlines for breakthroughs as well as...more
Efforts to Address the Lack of Federal Data Privacy Legislation in the U.S. Have Continued - The need for federal data privacy legislation was reiterated in the House Energy and Commerce Committee’s Subcommittee on...more
Most people know what a deepfake is but have not put much thought into how it could affect business operations. Deepfakes are videos, pictures, or audio that have been convincingly manipulated to misrepresent a person saying...more
While new forms of artificial intelligence and machine-learning systems, or AI, have garnered headlines in the mainstream press, many companies are evaluating its use in their businesses. Perhaps to a greater extent than with...more
AML compliance for reporting entities has never been of greater critical importance than it is today. With the growing sophistication of criminals and the methods and technologies that they employed, combined with the...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
Few things are certain, but it is indisputable that in 2022 data will remain big; data driven technologies will create unparalleled opportunity and risk; the frequency and sophistication of cyberattacks will shatter...more